Total vulnerabilities in the database
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path.
Software | From | Fixed in |
---|---|---|
ibm / sterling_b2b_integrator | 5.2 | 5.2.x |
ibm / sterling_b2b_integrator | 5.1 | 5.1.x |
ibm / sterling_file_gateway | 2.1 | 2.1.x |
ibm / sterling_file_gateway | 2.2 | 2.2.x |